Now its Google. Are You Next?
“Theft is not innovation,” said U.S. Attorney David Anderson when reding out the charge against former Google engineer Anthony Levandowski.
When your key contributor becomes a malicious insider
It is indeed unfortunate when a highly valued team member becomes a malicious entity – especially so when there is a fall in brand value and loss of a company’s most valued asset, its Intellectual Property.
Google was in the news recently, not for another innovative benchmark, but for loss of IP that could have powered a revolution in the automotive industry. On 28 August, one of Google’s key engineers, Anthony Levandowski, was arrested on charges of stealing classified information from Google’s self-driving car project before he went to work at Uber.
The data that Mr. Levandowski downloaded included thousands of files that included “critical engineering information” about hardware and instructions for calibrating and tuning Google’s custom Light Detecting And Ranging (LiDAR) device.
Do you use Microsoft? Then you should read our blog post ‘Why invest in a new CAD file security solution when you can leverage your investment in Microsoft AIP’
History repeats itself
It is common knowledge that other mega brands, such as Apple, too faced such unsavory experience. Its factory workers had pilfered and released yet-to-market iPhone designs into the Dark Web. What Apple did as consequence to this act was to down-size the number of ‘security staff’ instead of focusing on addressing the leakage of CAD drawings and schematics!
Tesla, another brand known for engineering innovation, too was in the news in the not-too-distant-past for having lost invaluable design IP due to a malicious insider. The person had purportedly created fake usernames to modify proprietary Manufacturing Operating System’s (MOS) source code and thus created an opportunity to export Gigabyte sized files, which included highly sensitive photographs and videos, and shared them with unknown third parties.
If you use Microsoft Information Protection, then why not leverage it to secure your CAD files? Watch this video to know how.
History repeats itself because people don’t learn their lesson
One of the key reasons why such news about data leaks is often in the global media is because those responsible for company data – whatever it may be – fail to look beyond the firewall. In other words, the common misconception is that authorization and user controls suffice in meeting the need data security fails in its proof.
IT security paradigms do not meet the needs of robust data security. The above-mentioned companies are verifiable proof. It is not enough to protect the boundaries, authorities must also protect the gaps and data itself.
How not to fall victim to insider threat
SECUDE has a ready solution, HALOCAD, that will protect your CAD files beyond your IT landscape – irrespective of whether you store CAD files in SAP or a non-SAP environment. Not just within, HALOCAD ensures sensitivity level outside your landscape – in fact, wherever the CAD file goes. The solution powers classification-based automated MIP policy assignment for your CAD files throughout their lifecycle. For more information, visit our product page.